Analysis

  • max time kernel
    136s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-02-2025 21:29

General

  • Target

    B-O-S-T-R-A-P-E-R.exe

  • Size

    1.3MB

  • MD5

    6b2997fc7396a92dba36300b22919eb5

  • SHA1

    668b7686960603f860850fb3b4717bd339557784

  • SHA256

    b3372fca3eb452875f5627f99b6c963684102a0f09f1fefd604f153de24b6ea7

  • SHA512

    6eddc2191c1859e5fe6a0045dc1797ef40e07760430662380c25e760fe45879a1c7f0ffa940154fc37f6c8e6b0017c66ed2b210f897739d6cefba2729764af51

  • SSDEEP

    24576:+zIp4NTME223+C0S1/B8TlsPPU++BoAunC6XtANU0poZslGtZ6GltIF0IU+LB:fdElzp1yTG3h+5uC6qxJQH57ImIJLB

Malware Config

Signatures

  • Detects Rhadamanthys payload 4 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Rhadamanthys family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2804
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\System32\svchost.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4488
    • C:\Users\Admin\AppData\Local\Temp\B-O-S-T-R-A-P-E-R.exe
      "C:\Users\Admin\AppData\Local\Temp\B-O-S-T-R-A-P-E-R.exe"
      1⤵
      • Checks computer location settings
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4444
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c copy Allow.flv Allow.flv.cmd & Allow.flv.cmd
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4636
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1720
        • C:\Windows\SysWOW64\findstr.exe
          findstr /I "opssvc wrsa"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3512
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2880
        • C:\Windows\SysWOW64\findstr.exe
          findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2496
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c md 114908
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2352
        • C:\Windows\SysWOW64\extrac32.exe
          extrac32 /Y /E Regression.flv
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3104
        • C:\Windows\SysWOW64\findstr.exe
          findstr /V "alternatively" Greeting
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3704
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b 114908\Insertion.com + Accepting + Organize + Horizontal + Curriculum + Enclosure + Mn + Lauderdale + Podcast + Drop 114908\Insertion.com
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2688
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c copy /b ..\Arrow.flv + ..\Approximately.flv + ..\Xi.flv + ..\Webcams.flv + ..\Whore.flv + ..\Strange.flv + ..\Margin.flv + ..\Truck.flv + ..\Bidding.flv + ..\Universal.flv i
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1960
        • C:\Users\Admin\AppData\Local\Temp\114908\Insertion.com
          Insertion.com i
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:2104
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 928
            4⤵
            • Program crash
            PID:2380
        • C:\Windows\SysWOW64\choice.exe
          choice /d y /t 5
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4984
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2104 -ip 2104
      1⤵
        PID:3384

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\114908\Insertion.com

        Filesize

        1KB

        MD5

        a0e238502491e85b1408fc8042e2501a

        SHA1

        d795724c50c66576c814915bf46a91d367483d43

        SHA256

        82887df9d44985057021ccc0bbcd9157383741dafd9be1e4457c8e2289f3b537

        SHA512

        d53176f3ea68f43002d116d14afb150d4543e0966a5c5c2c90762096339810814f7f2f0ba6142e281fd0568b5fdd170495f82e39576230515136c5511869c238

      • C:\Users\Admin\AppData\Local\Temp\114908\Insertion.com

        Filesize

        925KB

        MD5

        62d09f076e6e0240548c2f837536a46a

        SHA1

        26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

        SHA256

        1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

        SHA512

        32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

      • C:\Users\Admin\AppData\Local\Temp\114908\i

        Filesize

        648KB

        MD5

        7b3777980e8d42756de1491fb99c9d31

        SHA1

        573f09a294b197979c9923af8afe396a86a5a85e

        SHA256

        4c4dc3c51fe8295d2bc7949f3b398b0fc340a1fa7aabbdb568f4634953187e6d

        SHA512

        fad3fab9378cfd0fe671cc85c0c188db7f4e1a7165d293fea729e045eedc78e4a60aca21742862c9c684e36bfde9e133b97aac442f2359b46f81ba1603f6ad3f

      • C:\Users\Admin\AppData\Local\Temp\Accepting

        Filesize

        149KB

        MD5

        90d689a2efa422f2643165245be77678

        SHA1

        ef5802ea1a4bd251696e40461c36b0c2784ce453

        SHA256

        92ea6616fec195b098ae9b7dd92d953bf665ed47603a97bcbe64f90f6b98f676

        SHA512

        ebeac1e14ce157c92e52d89da04f9b5d41827b9f731ab80e2c83ffe7f4f7882e16e796546b516c6597d2cb9f7cb2b3dfb024e6a685f7ae76798ba4e004d19e4f

      • C:\Users\Admin\AppData\Local\Temp\Allow.flv

        Filesize

        32KB

        MD5

        1b10cefa3784bd9cac99084510034109

        SHA1

        a5a2a5f5ead84ca336454c1f2c75f9026c801bae

        SHA256

        cab267c22a7e1b8f4df5114cde08c6760a6646298673e47d93600d24bf9ff990

        SHA512

        4e66f417c4b65280705e53c71965d027d2ecf67ebcf3ac39a400d88605f22991e273c63e3aff7ca26669f18dfaf952ab54fc86f49e60550345f3a6486ae4898e

      • C:\Users\Admin\AppData\Local\Temp\Approximately.flv

        Filesize

        55KB

        MD5

        458d31c8a822287564abd321126cc4c5

        SHA1

        5caed7e21a0a18641c1bb689696c52f6f8c9a881

        SHA256

        983b1bb269a014859d2b5c93172c29589b3da0edb9794fd108164199d133e2ee

        SHA512

        889d253bef41b6ea6a68665cb4bb6705cb798c4e1299ac8335890018c8f4773fbfbfb68432b4c1597939992d3734d46e021d0a734466214971a892c6f02a3108

      • C:\Users\Admin\AppData\Local\Temp\Arrow.flv

        Filesize

        74KB

        MD5

        5e515b25ec3a768cc47c4b322b9e2082

        SHA1

        32e39abef2c574b73a26875213b4d908aed95ffb

        SHA256

        9da9e122bf87beb6a38ad935010ee77d2919b38568ae848bf17641202397f920

        SHA512

        47956a59b79e1aec3d16a77064f295e936becd921fb915bdaba06d5eb543c818a5a2d50eafbdb077c57c6e3be8826ee3bc6767481f0b4954cde2110369d35c41

      • C:\Users\Admin\AppData\Local\Temp\Bidding.flv

        Filesize

        86KB

        MD5

        7570e7dd9ec2e31753e3a390ed0d63e9

        SHA1

        6f7ef31825832c056f294e6aa7c333d6a96c6e70

        SHA256

        1f87cc6042591f0dbaadd01d95457d211c9e19740d918219a1ef87e1a819596f

        SHA512

        2a3a2961fa5f4b67bf35355b3ef99359756a7749a5a7c69c7d5218f07e79068260abb56ed0c28bd958b2b3de25ebf24077eb75289d1a46104828727b399fc918

      • C:\Users\Admin\AppData\Local\Temp\Curriculum

        Filesize

        81KB

        MD5

        61e96a5c935e7bc7c124cb12eb1f8a4c

        SHA1

        be1e5ed6beda445c424dcee11ce9588fbba27be4

        SHA256

        419e66e3db4d98d4b453fbb4d66ac707bebf7b4e7c5407dcd08e0ddbb81506f1

        SHA512

        64029e500ae133d7e1db3890fe334ef6ccaeaef8b96f6752d0d13ddaa08cf009199aa433ed4c442aab4af35b3fb9ad6d03ac3e8c54e844c6ffe15b410c3a4a2a

      • C:\Users\Admin\AppData\Local\Temp\Drop

        Filesize

        64KB

        MD5

        a013dd222c8ed7e618d714d0d585d540

        SHA1

        57ff0571f99f769f359b0de5325736cfa05cf5fd

        SHA256

        9c6a04a27295ca339cb5ce136533864ea84b8efb99f3131fbf34876487340631

        SHA512

        709595d96aae1278d75283a386da30c4b8c1d7ed81aca6d4dd377b180da9f760558d75e09cb3ab385b87739ede784b5d43189042457bca8c940aa4ac472251fd

      • C:\Users\Admin\AppData\Local\Temp\Enclosure

        Filesize

        125KB

        MD5

        bc6ea59b796248e9081c81f7cc2ecb8c

        SHA1

        aa51857602096b3ef93221c77162c5fbffb72482

        SHA256

        9226a535727b4507c7212d72fce5a66ad7b651324fe92eb4ac2b328bb96f028b

        SHA512

        da5201819f2b458aa4198474c450d9f8a91c5716f8231e728f2dd125a7f6b8081d84e2588afbdbfc4ebabd7a0684f462d409e4f05b7dd83538c6022bd5ef01d2

      • C:\Users\Admin\AppData\Local\Temp\Greeting

        Filesize

        1KB

        MD5

        72508266e8e0d7a42378ec3a84568b14

        SHA1

        315f3c0dbe06a669b5e2c25a7f92f1c4b9411e8a

        SHA256

        8715daf9642cc3c48fad9147212bedf7848795c43d5c12127db9985b7d3b31e7

        SHA512

        4246797585e4ff7b9c377e4cfdfa08903fa0696a43b095e60fab931122e3776bc79d6b3417b4897d0c4ccfd76a0561d2430027ff54064cc6877c2bde941a9e09

      • C:\Users\Admin\AppData\Local\Temp\Horizontal

        Filesize

        79KB

        MD5

        50078c8e0671fd2661d5fa46a1e0f3f6

        SHA1

        7c3b8a33802dd614c50bf5c27af05fc4e731d9f0

        SHA256

        f577bd40a9d049e5d9d2c0de86cd65ee9de8956807bfd2c624115146ad2254d1

        SHA512

        b4a175a085db82d96c9a00959c6bcb29ac1f9de28a9cd031e4954798213ec8c60e6102fbb711a9e5f5d5509dc38d773a0edac52fecf12d0cce1bae0d9bd8f285

      • C:\Users\Admin\AppData\Local\Temp\Lauderdale

        Filesize

        116KB

        MD5

        99dee9f940bb3e39c04a4873c3142aaa

        SHA1

        43fda8baa4444796860b2cec6fddd08b636a5b05

        SHA256

        892ab8830ef76eff0da641897a5c1784be506a67a9092a3d8b9a35a8e686903d

        SHA512

        ae9986ab7b08a5a920885bec7fa165161bf0b4e05d58c2a55868dab07aeea53c1dc0f57abdc0fd33d8ba27169510c4a329b50b87146437f47d3f937fef8a80bd

      • C:\Users\Admin\AppData\Local\Temp\Margin.flv

        Filesize

        53KB

        MD5

        9a5005e249f4476c7b8eadb891d44c35

        SHA1

        053e99c323cceff773e96114d4c10fe37fce2a74

        SHA256

        31fb39a84ec8bb0bd54e1860ed1d89755aba02fb5dd6bfb16078d7c17d4e2d18

        SHA512

        0cc6ded095f531c9ab7718a213bff001b20c64a7fb8f359f3a7279a043b3f99893dc64ea46c981461cd36bdb10f0cadb73d008cf2c31b41e77e3b193261880c2

      • C:\Users\Admin\AppData\Local\Temp\Mn

        Filesize

        80KB

        MD5

        7428b5b6877536b9bef1c2ab734f2b9f

        SHA1

        38101382d687c1004b36567e348a716d9395f6f3

        SHA256

        5caceaa95582a6da5ed70de8d3d1f95af3a5f1b4eb99601d9f83978521139c1a

        SHA512

        b4850bbd5b90320f247f73ad84fc80074bf08ee51c3a4accea4b416c40d9aa7012c776d7e54a6a8d741ab8360eecc0d555e4c964c9911ef4d21f300af49b0316

      • C:\Users\Admin\AppData\Local\Temp\Organize

        Filesize

        102KB

        MD5

        92eb53f7f95bdff4d1df18978ab876d3

        SHA1

        f5358ce5727c9b5bd97bf96def46559cb6eb6506

        SHA256

        8ddaf8f8301378434e2727cf9551a20c00ed6fb7cbf6fd92be37f2ad6684fdde

        SHA512

        81e2bc2c8b0d1aad4e413fe44be95719885de9c34bef9c303005f042f4beadb91eb1836c0c4c3a6c1181549221d3e759714038e9811ba61b6618a62528cc98e3

      • C:\Users\Admin\AppData\Local\Temp\Podcast

        Filesize

        127KB

        MD5

        b61eae46342cad6c27ba12d460315a8e

        SHA1

        9df2790c1a59834149c7d10c138f03ae901e278b

        SHA256

        f27ac8f73cc6d16081cae3e53b9fd0a5122007d175af2256bf15d1aab2e23da4

        SHA512

        478f428af707fbb5918bff5c1479de20cf6481554c204a3d7d8819d7ca7e3474eec36ed55f4654521a5fa8bd613fe417b6f8f41e17ec4743de51355cc695df65

      • C:\Users\Admin\AppData\Local\Temp\Regression.flv

        Filesize

        477KB

        MD5

        93bcaa3fcac99ca480e7c400b9f300cc

        SHA1

        070ea504ff1d5a6c6f55a802661dabec23a38863

        SHA256

        11ebf9bcb0da56dbe22c6a2725619f80100abfe2925bad0e1061c7358bf24bfe

        SHA512

        f27212fac966555ec9969dfa80cdd320041edbe56d69c6e029db60327d8e9eeea87219b77123d548e1f4c75645e105346d53cbf04f54c1cd527c64ed99cf7df9

      • C:\Users\Admin\AppData\Local\Temp\Strange.flv

        Filesize

        98KB

        MD5

        78616300e951fcc6b6fd8095800864c9

        SHA1

        4494ffa79f838827d7409f117e58dcf268dd9f07

        SHA256

        cf526c534adcbef5e6e73373cf7c1acbddb461015feef66f79226537ed27fa4e

        SHA512

        6e62f385a6d229e1cea25278add970ccae21bc242d32de7e997cfbf29026d10db70c545f079c1cd4548c99a0b98d872c1ef759f0de726f519f1a406bb80f1963

      • C:\Users\Admin\AppData\Local\Temp\Truck.flv

        Filesize

        51KB

        MD5

        68c160f7b8a884038fd7242c4d1ded93

        SHA1

        d7243c6344c07a4c9db527f8b91f9c3172c03c7f

        SHA256

        c6995bec7f71c37d663bcd2876127ad117d3736b6ebb1876438abb13b30e7102

        SHA512

        6755297519638a4738db51a76af9b2715eeaf14de77a3b8fff1b3df66b0463db4612adabf34f3e5db37eaee0d0dc8a5deb92cffe02ec7934ce817eac0ac78317

      • C:\Users\Admin\AppData\Local\Temp\Universal.flv

        Filesize

        19KB

        MD5

        1ef476c38ed819ef26f93a0b2c18420c

        SHA1

        20a8d789c62f72769a05a7da8e2e165743103935

        SHA256

        e15901035ceafd7b31a739f8bcbbf3c4148f47ff64f775277baf583c7febd88f

        SHA512

        443aa9548c59b596e5838bcf37632eeaff48501f79feca743411ec087b66b0b64756bbcb7716a671ca0b23931e6833eb5baeebe7dc362d2a172d9b0e986cf9ee

      • C:\Users\Admin\AppData\Local\Temp\Webcams.flv

        Filesize

        78KB

        MD5

        b767c911caba5726f440de19f7cc4975

        SHA1

        1791e211a5f64b89d0ebb7d5848e3ca9f436744a

        SHA256

        6c0aa10701f942a9eedb7bbe2f2e38d6552e43fc4f4ef3556bbf6950b6005b95

        SHA512

        e2193c501eb17bb7057911269f2c86223255f03023487f840c0f586d19cf0731139b51d19a99b949630fa1f7c1b5bf0c76d6ae995abe12a793817d32398771f7

      • C:\Users\Admin\AppData\Local\Temp\Whore.flv

        Filesize

        67KB

        MD5

        5d2ccd9b70d4deefd08fc908675386ec

        SHA1

        2188b9f8cbbadf7557b099b2d11ce380d7009085

        SHA256

        f7fdebae5fc36d1f57ee303aa919b10c41e44c75df3a2afce210406a3b17ecd7

        SHA512

        74d8e063e4b0b4906b42bf8bb9eaab4c36472072f6aa7d0b678edb715188a0d79f51f945a5b9aa83bc1ab4235dd5464435544ec30c337cfff8e563bf4b4123b2

      • C:\Users\Admin\AppData\Local\Temp\Xi.flv

        Filesize

        67KB

        MD5

        987b07e1d456f004b7a35e88ff791984

        SHA1

        75558dabdcf52232580cb195e8200526672afd89

        SHA256

        96c6e11014f52f6997ecaa9e96181b9a01104354ee8307319ecfc944a92af829

        SHA512

        4d21e01276d12f372f9a0c6b3ce8f9c68878ade0e60c575563d0989bd918dd4404e3c8cd04d2d617ecb2bf88e21624437f2e5cb02144c5d92ad68ca1e4e1215d

      • memory/2104-783-0x0000000000050000-0x00000000000D1000-memory.dmp

        Filesize

        516KB

      • memory/2104-784-0x0000000000050000-0x00000000000D1000-memory.dmp

        Filesize

        516KB

      • memory/2104-785-0x0000000000050000-0x00000000000D1000-memory.dmp

        Filesize

        516KB

      • memory/2104-788-0x0000000000050000-0x00000000000D1000-memory.dmp

        Filesize

        516KB

      • memory/2104-787-0x0000000000050000-0x00000000000D1000-memory.dmp

        Filesize

        516KB

      • memory/2104-789-0x0000000000050000-0x00000000000D1000-memory.dmp

        Filesize

        516KB

      • memory/2104-790-0x00000000051A0000-0x00000000055A0000-memory.dmp

        Filesize

        4.0MB

      • memory/2104-791-0x00000000051A0000-0x00000000055A0000-memory.dmp

        Filesize

        4.0MB

      • memory/2104-792-0x00007FFB7D810000-0x00007FFB7DA05000-memory.dmp

        Filesize

        2.0MB

      • memory/2104-794-0x0000000075FF0000-0x0000000076205000-memory.dmp

        Filesize

        2.1MB

      • memory/4488-795-0x00000000008B0000-0x00000000008BA000-memory.dmp

        Filesize

        40KB

      • memory/4488-798-0x00007FFB7D810000-0x00007FFB7DA05000-memory.dmp

        Filesize

        2.0MB

      • memory/4488-797-0x0000000000F10000-0x0000000001310000-memory.dmp

        Filesize

        4.0MB

      • memory/4488-800-0x0000000075FF0000-0x0000000076205000-memory.dmp

        Filesize

        2.1MB